Patent
1995-09-25
1998-06-16
Beausoliel, Jr., Robert W.
39518801, G06F 1100
Patent
active
057685037
ABSTRACT:
The authentication and security mechanism in a first program is used to access an application program which requires a different type of authentication and password. A server program runs in the same machine as the application program. The server program communicates with the first program and it is accessed and it authenticates the user utilizing the security and authentication mechanism of the first program. After the user ID of a user who desires access to the second program has been authenticated using the authentication mechanism of the first program, the server program (a) generates a temporary password for the authenticated user I.D., (b) changes the password for the authenticated user ID to the temporary password, (c) accesses the second program using the authenticated ID and the temporary password, and (d) receives data and/or commands from the first program using the security mechanism from the first program and transmits this data and/or commands to the second program and (e) receives data and/or commands from the second program and transmits the data and/or commands to the user using the security mechanism of the first program.
REFERENCES:
patent: 4799153 (1989-01-01), Hann et al.
patent: 5204961 (1993-04-01), Barlow
patent: 5241594 (1993-08-01), Kung
patent: 5339403 (1994-08-01), Parker et al.
patent: 5359721 (1994-10-01), Kempf et al.
patent: 5440744 (1995-08-01), Jacobson et al.
patent: 5497463 (1996-03-01), Stein et al.
McMahon, "Sesame V2 Public Key and Authorisation Extensions to Kerberos", Nwtwork and distributed System Security, Sympsium, IEEE, pp. 114-131, Apr. 1995.
Nueman et al., "Kerberos: An Authentication Service For Computer Networks", IEEE Communications Magazine, vol. 32, Iss. 9, pp. 33-38, Sep. 1994.
Ganesan, "Yaksha: Augmenting Kerberos With Public Key Cryptography", Network and Distributed System security Symposium, IEEE pp. 132-143, Apr. 1995.
Laferriere et al., "Authentication and Authorization Techniques in Distributed Systems", Carnahan Conference on Security Technology, IEEE, pp. 164-170, 1993.
Lunt, "Using Kerberos in Operation Systems", Globecom, IEEE, pp. 687-693, 1991.
Beausoliel, Jr. Robert W.
Galbi Elmer
International Business Machines - Corporation
Palys Joseph E.
Walker Mark S.
LandOfFree
Middleware program with enhanced security does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Middleware program with enhanced security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Middleware program with enhanced security will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1737178